By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
The most basic hardening procedure involves:
- removing the unnecessary applications and services
- deploying a host firewall
- increasing system logging
- then installing an integrity checking application (such as Tripwire)
Dig Deeper on Linux system security best practices
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.